US20020054680A1 - Optical watermark - Google Patents

Optical watermark Download PDF

Info

Publication number
US20020054680A1
US20020054680A1 US09/810,971 US81097101A US2002054680A1 US 20020054680 A1 US20020054680 A1 US 20020054680A1 US 81097101 A US81097101 A US 81097101A US 2002054680 A1 US2002054680 A1 US 2002054680A1
Authority
US
United States
Prior art keywords
watermark
latent image
layers
layer
dot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/810,971
Other versions
US7366301B2 (en
Inventor
Sheng Huang
Jian Wu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Trustcopy Pte Ltd
Original Assignee
Trustcopy Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trustcopy Pte Ltd filed Critical Trustcopy Pte Ltd
Assigned to TRUSTCOPY PTE LTD. reassignment TRUSTCOPY PTE LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KANG, WU JIAN, SHENG, HUANG
Publication of US20020054680A1 publication Critical patent/US20020054680A1/en
Application granted granted Critical
Publication of US7366301B2 publication Critical patent/US7366301B2/en
Adjusted expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain

Definitions

  • This invention generally relates to a method and apparatus for producing optical watermarks on printed and electronic documents.
  • the structure of a watermark is a repetitive pattern with the simplest and most basic as a two-dimensional (“2-D”) dot array.
  • the complexity of the dot pattern structure determines the security level.
  • Embedding a latent image object into a watermark is implemented by the modulation on the dot pattern with the latent image object.
  • Observing the latent image using a decoder is a process of demodulation.
  • the decoder is also a structured pattern, which corresponds to a particular dot pattern. It is implemented as an optical instrument, such as gratings, lenses, Ronchi Rulings, special films, or even a photocopier.
  • U.S. Pat. No. 5,915,027 relates to digital watermarking of data, including image, video and audio data, which is performed by repeatedly inserting the watermark into subregions or subimages of the data. Similarly, the watermark is repeatedly extracted from the subregions of the data.
  • This method is in a single layer and is not suitable to a text-based document or a document printed on paper.
  • U.S. Pat. No. 4,921,278 has an identification system using a computer generated Moire, and is based on a computer generated random pattern of broken lines. The overlap of the object grid and the reference grid will induce the moire effect. This method is in a single layer, is rather simple, and does not provide enough protection, such as counterfeit indication.
  • U.S. Pat. No. 5,734,752 is a method for generating watermarks in a digitally reproducible document which are substantially invisible when viewed. It uses stochastic screen patterns suitable for reproducing a gray image on a document, and another stochastic screen to correlate the first in order to view the content. This is quite similar to U.S. Pat. No. 4,921,278, except that it uses stochastic screen patterns to represent the gray images.
  • the present invention provides a method and apparatus to protect documents from counterfeit and forgery. It embeds multiple latent image objects into layers of repetitive structures to generate a watermark. The watermark is then incorporated into a document as for example, a seal, logo or background. This may be referred to as an optical watermark.
  • An optical watermark has one or several watermark layers.
  • One or two latent image objects are embedded into each watermark layer.
  • Each watermark layer has different structure, as well as a corresponding decoder to observe the latent image object embedded in it.
  • the latent image object embedded in a watermark layer can not be observed by the unaided human eye unless a decoder corresponding to that watermark layer's structure is overlapped onto the watermark.
  • a decoder for one watermark layer will not reveal latent image objects in other watermark layers due to the difference in their structure.
  • decoders can be considered as keys to the secrets, and the secrets are the latent image objects embedded in the watermark.
  • an optical watermark may appear as the logo of a company on a document issued by that company.
  • the first layer may be a cancellation word, such as “COPY”, and the verification device is the photocopier.
  • the cancellation word “COPY” appears if the printed original document is photocopied.
  • the latent image object in the second layer may be a logo of the company, and the verification device is a specially designed lens with gratings defined by periodical functions.
  • the lens can be given to the related organisations to verify the originality of the document.
  • the third layer may be embedded with a logo of a trusted third party.
  • the verification device is also a lens, but the structure is random dot pattern, which is more secure than the other layers.
  • FIG. 1 shows a layered structure of an optical watermark
  • FIG. 2 is an illustration of embedding latent image objects into a basic watermark layer
  • FIG. 3 is a demodulation result of letters “I” and “C”;
  • FIG. 4 shows the structure of the optical watermark
  • FIG. 5 shows a watermark with a random dot pattern
  • FIG. 6 shows a counterfeit-proof watermark layer with a letter “P” embedded
  • FIG. 7 is an electronic application
  • FIG. 8 is an electronic service model.
  • the optical watermark in this invention has a multiple layered structure as shown in FIG. 1. Watermark layers are superposed on each other to provide multiple layers and categories of protection. This superposition of several layers means that it is very difficult, if not impossible, to derive the parameters of the structure and the hidden information from the optical watermark alone.
  • Each watermark layer is a repetitive structured array of dots.
  • Latent image objects are embedded into the watermark layer by modulation. This may include, for example, phase modulation.
  • the structure and orientation of the different watermark layers in an optical watermark must be different from each other. Only the decoder corresponding to a particular watermark layer can be used to view the latent image object embedded in that particular watermark layer.
  • the basic watermark layer is a 2-D dot array, varying in two orthogonal directions.
  • phase modulation can be applied to both directions. As shown in FIG. 2, part 205 is the phase modulation in the horizontal direction to embed a letter “T”, while part 206 shows the phase modulation in the vertical direction to embed a letter “C”.
  • the phase modulation changes the distances between a pair of dots at the edge of the latent images in the direction of the phase modulation. According to the characteristics of the human visual system, such changes of distances will make the edge of the latent image become either lighter or darker than the overall grey level of the dot array. Such effect will reveal the shape of the latent images.
  • a “smoothing” process may be applied to the regions with an abrupt phase shift. For example, in FIG. 2, along regions indicated as 201 and 202 , the distance between a pair of dots was greater than the spatial repetitive period of the dot array. Therefore, a dot is added, together with distance adjustment, to make the edge a little darker. Patterns 201 and 202 are the results after compensation.
  • Patterns 203 and 204 are the result of this type of adjustment.
  • the decoder should have a grating structure with the same spatial frequency as the dot arrays.
  • the orientation of the decoder should be aligned in the same direction.
  • FIG. 3( 01 ) and FIG. 3( 02 ) show the demodulation result of FIG. 2. The detailed mathematical analysis is in accordance with a Fourier Series Expansion.
  • dot arrays are selected as the carrier dot patterns to embed latent image objects. Because dot arrays can be considered as 2-D signals, which vary in two orthogonal directions, two latent image objects can be modulated to one dot pattern in two directions with phase modulation. For the sake of simplicity, the dot arrays discussed here have the same spatial repetitive frequency in both directions. In an actual optical watermark, the frequencies in the two directions may be different.
  • a Fourier series expansion is employed to analyse the modulation and demodulation. Let us denote basic dot pattern as ⁇ [0,1] ⁇ 0 (x,y), where and the value 0 represents black, and 1 represents white. The superposition of line gratings can be represented with the product of functions. This multiplicative model enables analysis with a Fourier series expansion.
  • the phase-shifted dot array can be represented as ⁇ 1 (x,y) and ⁇ 2 (x,y), each corresponding to a modulation direction.
  • ⁇ n - ⁇ ⁇ ⁇ ⁇ ( y - nT ) ( 2 )
  • Two latent image objects to be modulated can be represented as g 1 (x,y) and g 2 (x,y). Their valid values can only be either 0 or 1. So the watermarked dot array can be represented as
  • the angle ⁇ is the angle between the orientation of ⁇ d (x,y) and the direction of y-axis.
  • c 1 ⁇ ( 1 , - 1 ) cos ⁇ 2 ⁇ ⁇ T ⁇ [ ( 1 - cos ⁇ ⁇ ⁇ ) ⁇ x + y ⁇ ⁇ sin ⁇ ⁇ ⁇ ] ( 15 )
  • c 2 ⁇ ( 1 , 1 ) cos ⁇ 2 ⁇ ⁇ T ⁇ [ x ⁇ ⁇ cos ⁇ ⁇ ⁇ + ( 1 - sin ⁇ ⁇ ⁇ ) ⁇ y ] ( 16 )
  • the mathematical derivation shows that with phase modulation two latent image objects can be modulated to the basic dot pattern. Because of the relatively high frequency of the dot array and the compensation methods applied on the edge, the latent image objects will not be observed by unaided eyes. In order to view the latent image objects, the frequency of the decoder should be the same as the frequency of the basic carrier dot pattern along that direction, and the orientation of the decoder should be aligned to the same direction in which the latent image object is modulated.
  • the human visual system has the highest contrast sensitivity in the mid spatial frequency range, around 2-6 c/deg.
  • the sensitivity has a sharp drop at high spatial frequencies.
  • the human eye is sensitive to relative phase, which is the shift or displacement between spatial signals at same frequency.
  • the threshold phase is represented by the displacement of about 0.85′ arc.
  • the threshold of relative phase is about 5°. A human observer will not be able to observe the relative phase, which is less than this threshold. So for high frequency signals, the displacement will not be easily observed by unaided eyes.
  • the latent image object in each watermark layer is encoded with relatively high repetitive frequency dot patterns with phase modulation.
  • the displacement is not significant to the human visual system because the relative phase difference is lower than, or similar to, the threshold at that relative high frequency, which is selected for the optical watermark. So the latent image objects will not be observed without proper decoders.
  • the frequencies of dot arrays along two directions can be different, and the dot arrays may take any orientation.
  • the watermark layer is denoted as L( ⁇ u , ⁇ v , ⁇ ,g u , g v ), where ⁇ y and ⁇ v are the frequencies of dot array in two directions ⁇ right arrow over (u) ⁇ and ⁇ right arrow over (v) ⁇ , respectively, and ⁇ is the angle between ⁇ right arrow over (u) ⁇ and ⁇ right arrow over (x) ⁇ (horizontal axis), the functions g u and g v , whose value can only be 1 or 0, represent the latent image objects in this layer.
  • each latent image object in this type of watermark layer There are two parameters for each latent image object in this type of watermark layer: one is the modulation frequency and the other is the modulation orientation.
  • the parameters for the latent image g u are ⁇ u and ⁇ right arrow over (u) ⁇ . While the parameters for the latent image g v are ⁇ v and ⁇ right arrow over (v) ⁇ . Only a decoder with the corresponding frequency can make a particular latent image visible when it's rotated to the corresponding direction. So the keys to the secrets in this type of watermark layer are the modulation frequency and the modulation orientation.
  • FIG. 401 shows the coordinates of one watermark layer, with reference to a x-y co-ordinate.
  • FIG. 402, 403 and 404 are three watermark layers, and
  • FIG. 405 is their superposition result.
  • the optical watermark is the superposition of several watermark layers.
  • the orientation difference ⁇ ij should be large enough, for example ⁇ ij ⁇ 60°, or in some cases ⁇ ij ⁇ 45°.
  • ⁇ u,i ⁇ v,j
  • FIG. 4( 05 ) shows an sample of the optical watermark, which is the superposition of FIG. 4( 02 ), FIG. 4( 03 ) and FIG. 4( 04 ).
  • the frequency and the orientation of the decoder are the keys to decode the latent image objects. Only when the frequency of the decoder matches the modulation frequency and orientation of a particular latent image object, will the latent image object appear in the superposition.
  • basic 2-D dot arrays can be generalized to any 2-D pattern, by coordinate mapping and superposition.
  • mapping functions are applied to the basic watermark layer. These mapping functions can be represented as
  • the parameters of a latent image object are the modulation frequency of the latent image object in the (u,v) coordinate space, the modulation orientation of the latent image object in the (u,v) coordinate space, and the mapping functions m x (u,v) and m y (u,v).
  • the sine function as the mapping function.
  • the corresponding decoder is d′(x,y) in eq. (28) but not d 0 (x,y) in eq. (27).
  • equation (28) that the key space is expanded by two factors: one is the sine function, and the other is the period of the sine function.
  • FIG. 501, 502 and 503 are simple watermark layers with/without phase modulation. It is relatively simple to derive parameters from them.
  • FIG. 504,505 and 506 are watermark layers with random dot patterns. It is very complex, and virtually impossible, to recover latent image object information without decoders.
  • the key space of the decoder used to view the embedded latent image object is an indication of the security a watermark method or apparatus may have.
  • the key space is very small for the prior art patents listed earlier. It is possible to find the key space with careful analysis or brute force attack from an expert in the area.
  • FIG. 501, 502 and 503 show regular patterns with andwithout phase modulation. From the view point of cryptography, the problem of these watermark layers is that the space of the keys is too small. It is obvious that one can easily derive the key parametter by observing the watermark.
  • the key space can be expanded by two factors.
  • the watermark layer can be further generalised as a random pattern in a 2-D space.
  • the amount of information of the latent image object can reach its maximum when it is randomly distributed.
  • the randomly distributed information is divided into two parts: the watermark layer is generated based on one part, while the decoder is generated based on the other part.
  • both of the watermark layer and the decoder hold the information about the latent image object.
  • the latent image is recoverable only when both the watermark layer and the decoder are presented.
  • Two functions g w (x,y) and g d (x,y) can be generated based on the latent image object g(x,y) and a random function r(x,y), which will return either 0 or 1 at random.
  • the function g w (x,y) is then encoded into the girds of the watermark layer with phase modulation, while the function g d (X, y) is also encoded into the line gratings of the decoder with phase modulation. Note that the value of g w (x,y), g d (x, y) and g(x, y) can only be either 1 or 0.
  • FIGS. 504, 505 and 506 are examples of the random pattern watermark layers corresponding to FIG. 501, FIG. 502 and FIG. 503.
  • the dot pattern of a watermark layer can be the result of a set of operations on one, or a set of basic, and other types of dot patterns.
  • the counterfeit-proof layer is an example.
  • the counterfeit-proof layer is a special watermark layer where a photocopier is the decoder to the latent image object.
  • the dot pattern in the counterfeit-proof watermark layer is based on the superposition of the basic dot arrays.
  • the latent image object in this layer which can be some cancelation words such as “COPY”, can be represented as a function g c (x,y). The value of this function can only be 0 or 1. Then this layer can be represented as a function w c (x,y).
  • the functions ⁇ a (x,y) and ⁇ b (x,y) represent two sets of basic dot arrays.
  • the repetitive period T a of ⁇ a (x,y) is slightly larger then the period T b of ⁇ b (x,y).
  • the A in eq. (33) represents a small displacement.
  • FIG. 601 is a sample of such a counterfeit-proof layer.
  • FIG. 602 is a enlarged view of the overlapped dot arrays which are represented by ⁇ a (x,y) ⁇ a (x+ ⁇ ,y+ ⁇ ). Each dot in the dot array ⁇ a (x,y) will adjoin to a dot in the other dot array ⁇ a (x+ ⁇ ,y+ ⁇ ) because ⁇ is a small enough displacement.
  • FIG. 603 is an enlarged view of the overlapped dot arrays which are represented with f b ⁇ ( x , y ) ⁇ f b ⁇ ( x + T b 2 , y + T b 2 ) .
  • the dot size in this counterfeit-proof layer should be carefully chosen. It should be smaller than the size of the dot that a photocopier can sample.
  • a preferred dot size is 1 600
  • FIG. 6 illustrates the post-processing for superposition of a counterfeitproof layer with other watermark layers.
  • FIG. 605 is the superposition result
  • FIG. 606 is the photocopying result of FIG. 605.As shown in FIG. 604, when a dot 613 of the watermark layer is superposed onto the counterfeit-proof layer, all other dots with a area indicated by the dash line box should be removed.
  • FIG. 605 is a enlarged view of the superposition
  • FIG. 606 shows the result after photocopying.
  • the latent image object “P” appears clearly.
  • optical watermark in document delivery, ardival and authentication can be applied to an electronic document.
  • the optical watermark added to the document can be viewed as a seal to provide authenticity to the document.
  • the visual apperance of the optical watermark can be disigned as a logo or seal of the authority to provide immediate trust.
  • the embedded information can be the name, signature and logo of the authority, or some number or words related to the document content.
  • application scenario 1 is an authority such as, for example, an immigration department of a government, which issues passports to citizens.
  • the optical watermark is attached to a page of the passport, either as the background or as a seal of the immigration department.
  • a photograph of the passport holder is embedded into one layer, and the name and birth date is on the other layers.
  • a special symbol is embedded into a random pattern watermark layer.
  • Key lenses are distributed to various parties who need to verify the validity of the passport. The random key can be retained by the immigration department for final verification.
  • the passport is issued by the immigration department, and the holder may need to be checked by other parties such as passport controller of other countries.
  • FIG. 8 is a service model.
  • a service provider provides delivery and authentication services to customers.
  • a customer for example, a shipping company, issues a bill of lading through the service provider to a shipper or consignee.
  • An optical watermark having a shape of the carrier's logo, is placed on all non-negotiable bills of lading as background.
  • Verification keys are distributed to banks and carrier agents for authentication purposes when the shipper and consignee use the bill of lading to claim the money and cargo.
  • the key lenses can be replaced periodically, for example, every 6 months, by the service provider for security reasons.
  • optical watermark described above can be readily applied to a document using more than one colour such as, for example, but not limited to, having different watermark layers into different colour channels in various colour spaces. Examples are CMYK and RGB.

Abstract

A multiple-layered watermark is generated to be placed on document, to protect against counterfeiting and forgery. Hidden information embedded into each of the watermark's layers is only detectable by using a corresponding decoder. Because of the multiple-layered structure, it is difficult to reverse engineer the optical watermark. The generalized watermark structure significantly increases the “key space” of the decoder.

Description

    FIELD OF THE INVENTION
  • This invention generally relates to a method and apparatus for producing optical watermarks on printed and electronic documents. [0001]
  • DEFINITION
  • Throughout this specification or reference to a document is to be taken as including a printed document and/or an electronic document and/or a copy (printed or electronic) of a printed document and/or a copy (printed or electronic) of an electronic document and will include such a document with text, image, graphics, video, photographs, and other multimedia appearing thereon or therein. [0002]
  • BACKGROUND TO THE INVENTION
  • The structure of a watermark, referred to as carrier dot pattern, is a repetitive pattern with the simplest and most basic as a two-dimensional (“2-D”) dot array. The complexity of the dot pattern structure determines the security level. Embedding a latent image object into a watermark is implemented by the modulation on the dot pattern with the latent image object. Observing the latent image using a decoder is a process of demodulation. The decoder is also a structured pattern, which corresponds to a particular dot pattern. It is implemented as an optical instrument, such as gratings, lenses, Ronchi Rulings, special films, or even a photocopier. [0003]
  • CONSIDERATION OF THE PRIOR ART
  • U.S. Pat. No. 5,915,027 relates to digital watermarking of data, including image, video and audio data, which is performed by repeatedly inserting the watermark into subregions or subimages of the data. Similarly, the watermark is repeatedly extracted from the subregions of the data. This method is in a single layer and is not suitable to a text-based document or a document printed on paper. [0004]
  • U.S. Pat. No. 4,921,278 has an identification system using a computer generated Moire, and is based on a computer generated random pattern of broken lines. The overlap of the object grid and the reference grid will induce the moire effect. This method is in a single layer, is rather simple, and does not provide enough protection, such as counterfeit indication. [0005]
  • U.S. Pat. No. 5,734,752 is a method for generating watermarks in a digitally reproducible document which are substantially invisible when viewed. It uses stochastic screen patterns suitable for reproducing a gray image on a document, and another stochastic screen to correlate the first in order to view the content. This is quite similar to U.S. Pat. No. 4,921,278, except that it uses stochastic screen patterns to represent the gray images. [0006]
  • Other patents similar these include: U.S. Pat. No. 5,708,717 which combines a source image with a latent image so that the scrambled latent image is visible only when viewed through a special decoder lens; U.S. Pat. No. 5,790,703 produces a first screen pattern suitable for reproducing a gray image on a document, and deriving at least one conjugate screen description that is related to the first pattern, so that overlapping them can reveal the content of the document; and U.S. Pat No. 6,000,728 uses different sizes of dot screens for anti-counterfeiting. [0007]
  • As can be seen from these US patents, there is only one layer of hidden information. The structure is exposed to attackers. Carefully observation of the structure with a microscope or similar instrument will reveal all information required to forge the image or document. [0008]
  • It is the principal object of the present invention is to address this problem and to provide a watermark which, in general, will not normally allow all necessary information to be revealed. [0009]
  • SUMMARY OF THE INVENTION
  • The present invention provides a method and apparatus to protect documents from counterfeit and forgery. It embeds multiple latent image objects into layers of repetitive structures to generate a watermark. The watermark is then incorporated into a document as for example, a seal, logo or background. This may be referred to as an optical watermark. [0010]
  • An optical watermark has one or several watermark layers. One or two latent image objects are embedded into each watermark layer. Each watermark layer has different structure, as well as a corresponding decoder to observe the latent image object embedded in it. The latent image object embedded in a watermark layer can not be observed by the unaided human eye unless a decoder corresponding to that watermark layer's structure is overlapped onto the watermark. On the other hand, a decoder for one watermark layer will not reveal latent image objects in other watermark layers due to the difference in their structure. As such, decoders can be considered as keys to the secrets, and the secrets are the latent image objects embedded in the watermark. [0011]
  • Layers in the optical watermark protect each other. Without knowing all the secrets (including latent image objects and parameters of the dot patterns) of the optical watermark, it's almost impossible to forge the watermark or change the latent image objects in watermark layers without being noticed. [0012]
  • The combination of layers of various security levels provides solutions for various applications needs. For example, an optical watermark may appear as the logo of a company on a document issued by that company. There can be, for example, three watermark layers. The first layer may be a cancellation word, such as “COPY”, and the verification device is the photocopier. The cancellation word “COPY” appears if the printed original document is photocopied. The latent image object in the second layer may be a logo of the company, and the verification device is a specially designed lens with gratings defined by periodical functions. The lens can be given to the related organisations to verify the originality of the document. The third layer may be embedded with a logo of a trusted third party. The verification device is also a lens, but the structure is random dot pattern, which is more secure than the other layers. [0013]
  • Because the superposition of multiple layers is a non-inversable process, the complicity of the optical watermark increases and it is very difficult, if not impossible, to reverse engineer to derive the parameters and hidden information from the watermark. Because there are multiple layers, different verification methods, including counterfeit indication, can be combined to form a much more secure application. These verifications can be done off-line with very simple devices. Above all, the invented method and aparatus can achieve very high security without using special ink or special paper. [0014]
  • BRIEF DESCRIPTION OF DRAWINGS
  • In order that the invention may be clearly understood and readily put into practical effect, there shall be described by way of non-limitative example only preferred embodiments of the present invention, the description being with reference to the accompanying illustrative drawings in which: [0015]
  • FIG. 1 shows a layered structure of an optical watermark; [0016]
  • FIG. 2 is an illustration of embedding latent image objects into a basic watermark layer; [0017]
  • FIG. 3 is a demodulation result of letters “I” and “C”; [0018]
  • FIG. 4 shows the structure of the optical watermark; [0019]
  • FIG. 5 shows a watermark with a random dot pattern; [0020]
  • FIG. 6 shows a counterfeit-proof watermark layer with a letter “P” embedded; [0021]
  • FIG. 7 is an electronic application; and [0022]
  • FIG. 8 is an electronic service model.[0023]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • The optical watermark in this invention has a multiple layered structure as shown in FIG. 1. Watermark layers are superposed on each other to provide multiple layers and categories of protection. This superposition of several layers means that it is very difficult, if not impossible, to derive the parameters of the structure and the hidden information from the optical watermark alone. [0024]
  • Each watermark layer is a repetitive structured array of dots. Latent image objects are embedded into the watermark layer by modulation. This may include, for example, phase modulation. The structure and orientation of the different watermark layers in an optical watermark must be different from each other. Only the decoder corresponding to a particular watermark layer can be used to view the latent image object embedded in that particular watermark layer. [0025]
  • Basic watermark layer-2-D dot arrays [0026]
  • The basic watermark layer is a 2-D dot array, varying in two orthogonal directions. To embed latent images, phase modulation can be applied to both directions. As shown in FIG. 2, [0027] part 205 is the phase modulation in the horizontal direction to embed a letter “T”, while part 206 shows the phase modulation in the vertical direction to embed a letter “C”.
  • The phase modulation changes the distances between a pair of dots at the edge of the latent images in the direction of the phase modulation. According to the characteristics of the human visual system, such changes of distances will make the edge of the latent image become either lighter or darker than the overall grey level of the dot array. Such effect will reveal the shape of the latent images. In order to compensate for this effect, a “smoothing” process may be applied to the regions with an abrupt phase shift. For example, in FIG. 2, along regions indicated as [0028] 201 and 202, the distance between a pair of dots was greater than the spatial repetitive period of the dot array. Therefore, a dot is added, together with distance adjustment, to make the edge a little darker. Patterns 201 and 202 are the results after compensation. On other hand, when the distance between two dots is much smaller than the repetitive period of the dot array, distance adjustment may also be necessary to make the edge a little lighter. Patterns 203 and 204 are the result of this type of adjustment. To view the latent image objects in the modulated dot arrays, the decoder should have a grating structure with the same spatial frequency as the dot arrays. In order to demodulate the latent image modulated in a particular direction, the orientation of the decoder should be aligned in the same direction. FIG. 3(01) and FIG. 3(02) show the demodulation result of FIG. 2. The detailed mathematical analysis is in accordance with a Fourier Series Expansion.
  • Mathematical Analysis of Phase Modulation for Embedding a Latent Image into a Basic Watermark Layer [0029]
  • In the optical watermark, dot arrays are selected as the carrier dot patterns to embed latent image objects. Because dot arrays can be considered as 2-D signals, which vary in two orthogonal directions, two latent image objects can be modulated to one dot pattern in two directions with phase modulation. For the sake of simplicity, the dot arrays discussed here have the same spatial repetitive frequency in both directions. In an actual optical watermark, the frequencies in the two directions may be different. [0030]
  • A Fourier series expansion is employed to analyse the modulation and demodulation. Let us denote basic dot pattern as [0031] ƒε[0,1] ƒ0(x,y), where and the value 0 represents black, and 1 represents white. The superposition of line gratings can be represented with the product of functions. This multiplicative model enables analysis with a Fourier series expansion.
  • The phase-shifted dot array can be represented as ƒ[0032] 1(x,y) and ƒ2(x,y), each corresponding to a modulation direction. f 0 ( x , y ) = 1 - n = - δ ( x - nT ) n = - δ ( y - nT ) ( 1 ) f 1 ( x , y ) = 1 - n = - δ ( x - nT - T 2 ) n = - δ ( y - nT ) ( 2 ) f 2 ( x , y ) = 1 - n = - δ ( x - nT ) n = - δ ( y - nT - T 2 ) ( 3 )
    Figure US20020054680A1-20020509-M00001
  • Two latent image objects to be modulated can be represented as g[0033] 1(x,y) and g2 (x,y). Their valid values can only be either 0 or 1. So the watermarked dot array can be represented as
  • w(x,y)=g 1(x,y)g 2(x,y0(x,y)+[1−g 1(x,y)]ƒ1(x,y)+[1−g 2(x,y)]ƒ2(x,y)  (4)
  • The decoders can be represented as [0034] f d = ( x , y ) = 1 - n = - δ ( x cos θ - y sin θ - nT ) ( 5 )
    Figure US20020054680A1-20020509-M00002
  • In eq. (A.5) the angle θ is the angle between the orientation of ƒ[0035] d(x,y) and the direction of y-axis. The superposition of the watermarked dot array and the decoder can be represented as
  • d(x,y)=w(x,yd(x,y)  (6)
  • All these functions can then be expanded into Fourier series as following. [0036] f 0 ( x , y ) = 1 - [ 1 T + 2 T n = 1 cos ( 2 π n T x ) ] [ 1 T + 2 T n = 1 cos ( 2 π n T y ) ] ( 7 ) f 1 ( x , y ) = 1 - [ 1 T + 2 T n = 1 cos ( n π ) cos ( 2 π n T x ) ] [ 1 T + 2 T n = 1 cos ( 2 π n T y ) ] ( 8 ) f 2 ( x , y ) = 1 - [ 1 T + 2 T n = 1 cos ( 2 π n T x ) ] [ 1 T + 2 T n = 1 cos ( n π ) cos ( 2 π n T y ) ] ( 9 ) f d ( x , y ) = ( 1 - 1 T ) - 2 T n = 1 cos [ 2 π n T ( x cos θ - y sin θ ) ] ( 10 )
    Figure US20020054680A1-20020509-M00003
  • The superposition can be analysed based on above expansions. There will be many components in the expansion of eq. (A.6). In order to make the analysis as clear as possible, all high frequency components can be ignored. Only the components, which probably have lower frequencies will be referred to in this analysis. Such components in d(x,.y) are analysed as following equations. [0037] n = 1 cos ( 2 π n T x ) n = 1 cos [ 2 π n T ( x cos θ - y sin θ ) ] = 1 2 m = 1 n = 1 c 1 ( m , n ) + c 1 ( m , - n ) ( 11 ) c 1 ( m , n ) = cos 2 π T [ ( m + n cos θ ) x - ny sin θ ] ( 12 ) n = 1 cos ( 2 π n T y ) n = 1 cos [ 2 π n T ( x cos θ - y sin θ ) ] = 1 2 m = 1 n = 1 c 2 ( m , n ) + c 2 ( m , - n ) ( 13 ) c 2 ( m , n ) = cos 2 π T [ nx cos θ + ( m - n sin θ ) y ] ( 14 )
    Figure US20020054680A1-20020509-M00004
  • When the value of θ is very close to 0°, only the frequency of the component c[0038] 1(1,-1) will be much lower than the frequency of the carrier dot pattern. While the value of θ is slightly above or below 90°, only the component c2(1,1) will have lower frequency. So for these two cases only c1(1,-1) or c2(1,1) will be significant in superposition. c 1 ( 1 , - 1 ) = cos 2 π T [ ( 1 - cos θ ) x + y sin θ ] ( 15 ) c 2 ( 1 , 1 ) = cos 2 π T [ x cos θ + ( 1 - sin θ ) y ] ( 16 )
    Figure US20020054680A1-20020509-M00005
  • In case when c[0039] 1(1,-1) is most significant, the significant components in eq. (6) will be the following three. Then only one latent image g1(x,y) can be clearly observed because of the relative phase. g 1 ( x , y ) g 2 ( x , y ) cos 2 π T [ ( 1 - cos θ ) x + y sin θ ] 1 ) [ 1 - g 1 ( x , y ) ] cos 2 π T [ ( 1 - cos θ ) x + y sin θ ± T 2 ] 2 ) [ 1 - g 2 ( x , y ) ] cos 2 π T [ ( 1 - cos θ ) x + y sin θ ] 3 )
    Figure US20020054680A1-20020509-M00006
  • In case when c[0040] 2 (1,1) is most significant, the significant components in eq. (6) will be the following three. Then only one latent image g2(x,y) can be clearly observed because of the relative phase. g 1 ( x , y ) g 2 ( x , y ) cos 2 π T [ x cos θ + ( 1 - sin θ ) y ] 1 ) [ 1 - g 1 ( x , y ) ] cos 2 π T [ x cos θ + ( 1 - sin θ ) y ] 2 ) [ 1 - g 2 ( x , y ) ] cos 2 π T [ x cos θ + ( 1 - sin θ ) y ± T 2 ] 3 )
    Figure US20020054680A1-20020509-M00007
  • The mathematical derivation shows that with phase modulation two latent image objects can be modulated to the basic dot pattern. Because of the relatively high frequency of the dot array and the compensation methods applied on the edge, the latent image objects will not be observed by unaided eyes. In order to view the latent image objects, the frequency of the decoder should be the same as the frequency of the basic carrier dot pattern along that direction, and the orientation of the decoder should be aligned to the same direction in which the latent image object is modulated. [0041]
  • Here there are used two characteristics of the human visual system. First, the human visual system has the highest contrast sensitivity in the mid spatial frequency range, around 2-6 c/deg. The sensitivity has a sharp drop at high spatial frequencies. Second, the human eye is sensitive to relative phase, which is the shift or displacement between spatial signals at same frequency. For frequencies higher than 3 c/deg, the threshold phase is represented by the displacement of about 0.85′ arc. For frequencies less than 3 c/deg, the threshold of relative phase is about 5°. A human observer will not be able to observe the relative phase, which is less than this threshold. So for high frequency signals, the displacement will not be easily observed by unaided eyes. [0042]
  • The latent image object in each watermark layer is encoded with relatively high repetitive frequency dot patterns with phase modulation. The displacement is not significant to the human visual system because the relative phase difference is lower than, or similar to, the threshold at that relative high frequency, which is selected for the optical watermark. So the latent image objects will not be observed without proper decoders. [0043]
  • To generalise from the 2-D dot array watermark layer, the frequencies of dot arrays along two directions can be different, and the dot arrays may take any orientation. If the watermark layer is denoted as L(ƒ[0044] uv,θ,gu, gv), where ƒy and ƒv are the frequencies of dot array in two directions {right arrow over (u)} and {right arrow over (v)}, respectively, and θ is the angle between {right arrow over (u)} and {right arrow over (x)} (horizontal axis), the functions gu and gv, whose value can only be 1 or 0, represent the latent image objects in this layer. The function representing a watermark layer is: L [ f u , f v , θ , g u ( x , y ) , g v ( x , y ) ] = g u ( x , y ) g v ( x , y ) [ 1 - n = - δ ( x cos θ + y sin θ - n f u ) n = - δ ( y cos θ + x sin θ - n f v ) ] + g v ( x , y ) [ 1 - g u ( x , y ) ] [ 1 - n = - δ ( x cos θ + y sin θ - n f u - 1 2 f u ) n = - δ ( y cos θ - x sin θ - n f v ) ] + g u ( x , y ) [ 1 - g v ( x , y ) ] [ 1 - n = - δ ( x cos θ + y sin θ - n f u ) n = - δ ( y cos θ - x sin θ - n f v - 1 2 f v ) ] + [ 1 - g u ( x , y ) ] [ 1 - g v ( x , y ) ] [ 1 - n = - δ ( x cos θ + y sin θ - n f u - 1 2 f u ) n = - δ ( y cos θ - x sin θ - n f v - 1 2 f v ) ] ( 17 )
    Figure US20020054680A1-20020509-M00008
  • There are two parameters for each latent image object in this type of watermark layer: one is the modulation frequency and the other is the modulation orientation. The parameters for the latent image g[0045] u are ƒu and {right arrow over (u)}. While the parameters for the latent image gv are ƒv and {right arrow over (v)}. Only a decoder with the corresponding frequency can make a particular latent image visible when it's rotated to the corresponding direction. So the keys to the secrets in this type of watermark layer are the modulation frequency and the modulation orientation.
  • Multiple Layers Structure [0046]
  • Reference is now made to FIG. 4 where FIG. 401 shows the coordinates of one watermark layer, with reference to a x-y co-ordinate. FIG. 402, 403 and [0047] 404 are three watermark layers, and FIG. 405 is their superposition result.
  • The optical watermark is the superposition of several watermark layers. Such superposition can be represented as [0048] W = n = 1 N L n ( f u , n , f v , n , θ n , g u , n , g v , n ) ( 18 )
    Figure US20020054680A1-20020509-M00009
  • According to the above analysis, there would be some low frequency components in this superposition of multiple repetitive structures. Such low frequency components could probably bring unwanted visual effects, or even reveal the latent images without decoders. This problem can be avoided if the following requirements can be met for any two layers, L[0049] i and Lj, in the optical watermark:
  • 1. If ƒ[0050] u,iu,j or ƒv,iv,j, the orientation difference Δθij should be large enough, for example Δθij≧60°, or in some cases Δθij≧45°.
  • 2. If ƒ[0051] u,iv,j, Δθij should be less than 60°, for example Δθij≦60°. (where Δθij=arccos(|cos(θi−θj)|), and 0°≦Δθij≦90°)
  • The above two requirements mean that no component will have a frequency much lower than the frequency of any carrier dot arrays in the superposition. FIG. 4([0052] 05) shows an sample of the optical watermark, which is the superposition of FIG. 4(02), FIG. 4(03) and FIG. 4(04).
  • When the decoder, which is represented with the fuction d(x,y), are superposed onto the optical watermark, the result of the decoding can be respresented as [0053] D = d ( x , y ) · W = d ( x , y ) · n = 1 N L n ( f u , n , f v , n , θ n , g u , n , g v , n ) ( 19 ) d ( x , y ) = 1 - n = - δ ( x cos θ d + y sin θ d - n f d ) ( 20 )
    Figure US20020054680A1-20020509-M00010
  • From the analysis in Appendix A, the following results can be obtained: [0054]
  • 1. When ƒ[0055] d equals ƒu,i and |θd−θi| is very small, the latent image gu,i(x,y) will be visible in the superposition.
  • 2. When ƒ[0056] d equals ƒv,i and |θd−θi| is almost 90°, the latent image gv,i(x,y) will be visible in the superposition.
  • The frequency and the orientation of the decoder are the keys to decode the latent image objects. Only when the frequency of the decoder matches the modulation frequency and orientation of a particular latent image object, will the latent image object appear in the superposition. [0057]
  • Hence, in the mutilple-layer stucture, all latent image objects can be decoded seperately from the watermark layers. Every watermark layer carries its own latent image objects, and from the knowledge of one particular watermark layer it is very difficult, and almost impossible, to derive the latent images or the parameters of the other watermark layers. [0058]
  • The other advantage of this multiple-layer structure is that all the watermark layers protect each other. Without knowing the details (parameters and latent image objects) of all the watermark layers, it's very difficult, and almost impossible, to change the information in one of the watermark layers. If one of the watermark layers is changed, all other watermark layers will also be affected by this change. Therefore, this change, even it may be authorized by one party, will invalidate the authenticity of the document, in a scenario of a multiple party application, where each party is holding a “key” to a latent image object. [0059]
  • Coordinate mapping to generate complex watermark layer [0060]
  • In a basic watermark layer, the key space to the hidden information is the frequency of the decoder, which is relatively small. Generally, basic 2-D dot arrays can be generalized to any 2-D pattern, by coordinate mapping and superposition. [0061]
  • In the case of coordinate mapping, linear or non-linear coordinate mapping functions are applied to the basic watermark layer. These mapping functions can be represented as [0062]
  • x=m x(u,v)  (21)
  • y=m y(u,v)  (22)
  • Functions m[0063] x(u,v) and my(u,v) map the coordinate space from (u,v) to (x,y). In (u,v) coordinate space, the modulation and demodulation of the watermark layer are the same as the basic watermark layer. But the demodulation with a decoder is done in the (x,y) coordinate space. Hence, the decoder in the (x,y) coordinate space should be mapped from the corresponding decoder in the (u, v) coordinate space. So in coordinate mapping the watermark layer, the parameters of a latent image object are the modulation frequency of the latent image object in the (u,v) coordinate space, the modulation orientation of the latent image object in the (u,v) coordinate space, and the mapping functions mx(u,v) and my(u,v).
  • For example, the sine function as the mapping function. The mapping of coordinate system can be represented as: [0064] x = sin 2 π T v + u ( 23 )
    Figure US20020054680A1-20020509-M00011
  • y=v  (24)
  • While the dot array in the (u,v) coordinate space is represented as: [0065] f ( u , v ) = 1 - n = - δ ( u - n f u ) n = - δ ( v - n f v ) ( 25 )
    Figure US20020054680A1-20020509-M00012
  • With coordinate mapping, the corresponding fuction in the (x,y) coordinate space can be derived as: [0066] f ( x , y ) = 1 - n = - δ ( x - sin 2 π T y - n f u ) n = - δ ( y - n f v ) ( 126 )
    Figure US20020054680A1-20020509-M00013
  • In order to demodulate the latent image object embedded in the watermark layer with coordinate system mapping, the original decoder should also be mapped from the (u,v) coordinate system to the (x,y) coordinate system: [0067] d ( u , v ) = 1 - n = - δ ( u - n f u ) ( 27 ) d ( x , y ) = 1 - n = - δ ( x - sin 2 π T y - n f u ) ( 28 )
    Figure US20020054680A1-20020509-M00014
  • For the latent image in the mapped watermark layer ƒ′(x,y), the corresponding decoder is d′(x,y) in eq. (28) but not d[0068] 0(x,y) in eq. (27). As can be seen from equation (28), that the key space is expanded by two factors: one is the sine function, and the other is the period of the sine function.
  • Random pattern watermark Layer [0069]
  • To refer to FIG. 5, FIG. 501, 502 and [0070] 503 are simple watermark layers with/without phase modulation. It is relatively simple to derive parameters from them. FIG. 504,505 and 506 are watermark layers with random dot patterns. It is very complex, and virtually impossible, to recover latent image object information without decoders.
  • The key space of the decoder used to view the embedded latent image object is an indication of the security a watermark method or apparatus may have. The key space is very small for the prior art patents listed earlier. It is possible to find the key space with careful analysis or brute force attack from an expert in the area. As a few examples, FIG. 501, 502 and [0071] 503 show regular patterns with andwithout phase modulation. From the view point of cryptography, the problem of these watermark layers is that the space of the keys is too small. It is obvious that one can easily derive the key parametter by observing the watermark.
  • By linear and non-linear mapping of the basic watermark layer, the key space can be expanded by two factors. To further expand the key space to increase the security of the hidden information, the watermark layer can be further generalised as a random pattern in a 2-D space. [0072]
  • According to information theory, the amount of information of the latent image object can reach its maximum when it is randomly distributed. In a random pattern watermark layer, the randomly distributed information is divided into two parts: the watermark layer is generated based on one part, while the decoder is generated based on the other part. Hence, both of the watermark layer and the decoder hold the information about the latent image object. The latent image is recoverable only when both the watermark layer and the decoder are presented. [0073]
  • Two functions g[0074] w(x,y) and gd(x,y) can be generated based on the latent image object g(x,y) and a random function r(x,y), which will return either 0 or 1 at random. The function gw(x,y) is then encoded into the girds of the watermark layer with phase modulation, while the function gd(X, y) is also encoded into the line gratings of the decoder with phase modulation. Note that the value of gw(x,y), gd(x, y) and g(x, y) can only be either 1 or 0.
  • g w(x,y)=g(x,y)r(x,y)+[1−g(x,y)][1−r(x,y)]  (29)
  • g d(x,y)=r(x,y)  (30)
  • No information about the latent image object can be found from investigating the function either g[0075] d(x,y) or gw(x,y). There is a relationship between the function gd(x,y) and gw(x,y). If the value of g(x,y) is 1, the function gd(x,y) equals to gw(x,y). While if the value of g(x,y) is 0, the function gw(x,y) equals to 1−gd(x,y).
  • The watermark layer can be represented as: [0076] w ( x , y ) = g w ( x , y ) [ 1 - n = - δ ( x - nT x ) n = - δ ( y - nT y ) ] + [ 1 - g w ( x , y ) ] [ 1 - n = - δ ( x - nT x - 1 2 T x ) n = - δ ( y - nT y ) ] ( 31 )
    Figure US20020054680A1-20020509-M00015
  • And the decoder as: [0077] d ( x , y ) = g d ( x , y ) { 1 - n = - δ ( x - nT x ) n = - [ u ( y - nT y ) - u ( y - nT y - T y ) ] } + [ 1 - g d ( x , y ) ] { 1 - n = - δ ( x - nT x - 1 2 T x ) n = - [ u ( y - nT y ) - u ( y - nT y - T y ) ] } ( 32 )
    Figure US20020054680A1-20020509-M00016
  • From above equations, it can be seen that when the value of g(x,y) is 0, there is a relatve phase difference between the watermark layer and the decoder, and that when the value of g(x,y) is 1, there is no relatve phase difference between the watermark layer and the decoder. This implies that the latent image will appear because of the demodulation of the relative phase difference when the watermark layer and decoder are correctly overlapped. [0078]
  • FIGS. 504, 505 and [0079] 506 are examples of the random pattern watermark layers corresponding to FIG. 501, FIG. 502 and FIG. 503.
  • Since the amount of information in a random pattern watermark layer is 2 to the power of the dimension of the latent image object, the security level will be very high. Since both the watermark layer and the decoder carry part of the latent image object, from either the watermark layer or the decoder alone it is virtually impossible to derive the other. On other hand, a random pattern watermark layer needs accurate alignment to reveal the latent image object. [0080]
  • Counterfeit-proof Layer [0081]
  • The dot pattern of a watermark layer can be the result of a set of operations on one, or a set of basic, and other types of dot patterns. Here, the counterfeit-proof layer is an example. The counterfeit-proof layer is a special watermark layer where a photocopier is the decoder to the latent image object. The dot pattern in the counterfeit-proof watermark layer is based on the superposition of the basic dot arrays. The latent image object in this layer, which can be some cancelation words such as “COPY”, can be represented as a function g[0082] c(x,y). The value of this function can only be 0 or 1. Then this layer can be represented as a function wc(x,y). w c ( x , y ) = [ 1 - g c ( x , y ) ] f a ( x , y ) f a ( x + Δ , y + Δ ) + g c ( x , y ) f b ( x , y ) f b ( x + T b 2 , y + T b 2 ) ( 33 ) f a ( x , y ) = 1 - n = - δ ( x - nT a ) n = - δ ( y - nT a ) ( 34 ) f b ( x , y ) = 1 - n = - δ ( x - nT b ) n = - δ ( y - nT b ) ( 35 )
    Figure US20020054680A1-20020509-M00017
  • The functions ƒ[0083] a(x,y) and ƒb(x,y) represent two sets of basic dot arrays. The repetitive period Ta of ƒa(x,y) is slightly larger then the period Tb of ƒb(x,y). And the A in eq. (33) represents a small displacement.
  • FIG. 601 is a sample of such a counterfeit-proof layer. FIG. 602 is a enlarged view of the overlapped dot arrays which are represented by ƒ[0084] a(x,y)ƒa(x+Δ,y+Δ). Each dot in the dot array ƒa(x,y) will adjoin to a dot in the other dot array ƒa(x+Δ,y+Δ) because Δ is a small enough displacement. While FIG. 603 is an enlarged view of the overlapped dot arrays which are represented with f b ( x , y ) f b ( x + T b 2 , y + T b 2 ) .
    Figure US20020054680A1-20020509-M00018
  • Because of the displacement [0085] T b 2 ,
    Figure US20020054680A1-20020509-M00019
  • no dot in the dot array ƒ[0086] b(x,y) will adjoin to a dot in the other dot array f b ( x + T b 2 , y + T b 2 ) .
    Figure US20020054680A1-20020509-M00020
  • In order to let the latent image object appear after photocopying, the dot size in this counterfeit-proof layer should be carefully chosen. It should be smaller than the size of the dot that a photocopier can sample. [0087]
  • A preferred dot size is [0088] 1 600
    Figure US20020054680A1-20020509-M00021
  • inches, because the optical resolution of most photocopiers is less than 600 lpi. Such dots will disappear after photocopying because they are too small to be recognized by the photocopier. As such, the regions where the value of g[0089] c(x,y) is 1, will fade after photocopying because all dots in these regions are isolated and cannot be sampled by the photocopier. On other hand, the regions where the value of gc(x,y) is 0, will still remain because adjacent dot pairs are viewed as having a relatively large size, and can be sampled by the photocopier. Hence the latent image object will be able to appear after photocopying.
  • Note both frequences, [0090] 1 T a
    Figure US20020054680A1-20020509-M00022
  • and [0091] 1 T b ,
    Figure US20020054680A1-20020509-M00023
  • in eq. (33) should be high enough to exceed the resolution limit of the human visual system. According to the characteristics of the human visual system, the detailed structure of the counterfeit-proof layer will not be observable by unaided eyes. The regions where the value of g[0092] c(x,y) is 0 will look lighter in the grey scale than the regions where the value of gc(x,y) is 1.
  • Superposition of the counterfeit-proof layer with other watermark layers proctects the counterfeit-proof layer. Because of the simple structure of the counterfeit-proof layer, it is relatively easy to analyse the layer and reproduce it. [0093]
  • Superposition of counterfeit-proof layer with other watermark layers is also operated according to eq. (18). The only necessary post-processing is for the region outside the latent image object. FIG. 6 of relevance here with FIGS. 602 and 603 representing typical dot patterns in object regions and non-object regions. FIG. 604 illustrates the post-processing for superposition of a counterfeitproof layer with other watermark layers. FIG. 605 is the superposition result and FIG. 606 is the photocopying result of FIG. 605.As shown in FIG. 604, when a [0094] dot 613 of the watermark layer is superposed onto the counterfeit-proof layer, all other dots with a area indicated by the dash line box should be removed. The principle is that the superposition should not change the grey level of the regions where the value of gc(x,y) is 1. As the result of superposition, both the inside and the outside of the latent image object have the same grey level. Because the structure in the counterfeit-proof layer has a frequency exceeding the resolution of the human visual system, it looks like a patch of countious grey tone to unaided eyes. FIG. 605 is a enlarged view of the superposition, FIG. 606 shows the result after photocopying. The latent image object “P” appears clearly.
  • Optical watermark in document delivery, ardival and authentication. The optical watermark can be applied to an electronic document. The optical watermark added to the document can be viewed as a seal to provide authenticity to the document. The visual apperance of the optical watermark can be disigned as a logo or seal of the authority to provide immediate trust. The embedded information can be the name, signature and logo of the authority, or some number or words related to the document content. [0095]
  • As show in the FIG. 7, application scenario [0096] 1 is an authority such as, for example, an immigration department of a government, which issues passports to citizens. Here, the optical watermark is attached to a page of the passport, either as the background or as a seal of the immigration department. A photograph of the passport holder is embedded into one layer, and the name and birth date is on the other layers. Finally, a special symbol is embedded into a random pattern watermark layer. Key lenses are distributed to various parties who need to verify the validity of the passport. The random key can be retained by the immigration department for final verification. Here, the passport is issued by the immigration department, and the holder may need to be checked by other parties such as passport controller of other countries.
  • Another type of application is illustrated in FIG. 8, which is a service model. A service provider provides delivery and authentication services to customers. A customer, for example, a shipping company, issues a bill of lading through the service provider to a shipper or consignee. An optical watermark, having a shape of the carrier's logo, is placed on all non-negotiable bills of lading as background. Verification keys are distributed to banks and carrier agents for authentication purposes when the shipper and consignee use the bill of lading to claim the money and cargo. The key lenses can be replaced periodically, for example, every 6 months, by the service provider for security reasons. [0097]
  • The optical watermark described above can be readily applied to a document using more than one colour such as, for example, but not limited to, having different watermark layers into different colour channels in various colour spaces. Examples are CMYK and RGB. [0098]
  • Whilst there has been described in the foregoing description a preferred embodiment of the present invention, it will be understood by those skilled in the technology that may variations or modifications may be made without departing from the present invention. [0099]

Claims (45)

The claims
1. A method for producing a watermark on a document, the method including the step of:
a) determining a required plural number of watermark layers and a dot patterns for each of the plurality of watermark layers;
b) selecting at least one latent image object for each of the plural number of watermark layers and embedding each latent image object into its respective watermark layer;
c) superposing the watermark layers to form the watermark;
d) defining and generating a decoder for each of the number of watermark layers; and
e) applying the watermark to the document.
2. The method of claim 1, wherein the dot pattern for each of the number of watermark layers is a pattern defined on a two dimensional digital image plane.
3. The method of claim 2, wherein the dot pattern is a basic two-dimensional dot array.
4. The method of claim 2, wherein the dot pattern is a linear coordinate mapping of a basic two-dimensional dot array.
5. The method of claim 2, wherin the dot pattern also includes a non-linear coordinate mapping of a basic two-dimensional dot array.
6. The method of claim 2, wherein the dot pattern is a random distributed dot array
7. The method of claim 2, wherein the dot pattern is a result of a set of operations on a set of basic and other types of two-dimensional dot arrays.
8. The method of claim 1, wherein the latent image objects contain information which is critical to the application.
9. The method of claim 8, wherein the information is from the group consisting of: copy, void, a critical name, and a number from the document.
10. The method of claim 1, wherein the latent image object is embedded into each watermark layer by a modulation method.
11. The method of claim 10, wherein the modulation method is phase modulation.
12. The method of claim 11, wherein the phase modulation includes a post-processing to smooth any abrupt phase changes along the edges of the latent image object.
13. The method of claim 1, wherein the decoder has a decoder structure related to a dot pattern structure of a carrier dot pattern of the watermark layer and in the direction where the latent image object is embedded.
14. The method of claim 13, wherein the relationship is selected from the group consisting of: the same, and conjunct.
15. The method of claim 10, wherein after modulation the watermark layer and its decoder each carries part of the information of the latent image object which is generated based on the latent image object and a random function.
16. The method of claim 1, wherein the watermark layers are different to each other and are of sufficient difference to avoid interference between them as a result of them being superposed.
17. The method of claim 13, wherin one of the watermark layers is a counterfeit-proof layer, the decoder for which is a photocopier.
18. The method of claim 17, wherein after the superposition of the watermark layers with the counterfeit-proof layer there is included a post-processing step to remove dots which are too close to adjacent dots in a non-object area.
19. The method of claim 1 when included in a method for printing a document for protection and authentication including the steps of:
a) verifying the authenticity and copyright of the document before printing;
b) generating the watermark according to the method of claim 1;
c) controlling the printing process to protect the document and the watermark from attack; and
d) generating the decoder device and distributing the decoder device to enable verification of the authenticity of the document.
20. The method of claim 1, wherein the watermark is extended to colour documents.
21. The method of claim 20, wherein the watermark layers are in different colour channels in various colour spaces.
22. The method of claim 21, wherein colour spaces CMY/CMYK, HIS, XYA, Yuv and RGB are used.
23. A watermark for use on a document, the watermark having:
a) a required plural number of watermark layers, each of the plural number of watermark layers each being a dot pattern;
b) at least one latent image object embedded into each watermark layer; and
c) the watermark layers being superposed to form the watermark
24. The watermark of claim 23, wherein the dot pattern for each of the number of watermark layers is a dot pattern defined on a two dimensional digital image plane.
25. The watermark of claim 24, wherein the dot pattern is a basic two-dimensional dot array.
26. The watermark of claim 24, wherein said dot pattern for the watermark is a linear coordinate mapping of a basic two-dimensional dot array.
27. The watermark of claim 26, wherin the dot pattern also includes a non-linear coordinate mapping of a basic two-dimensional dot array.
28. The watermark of claim 24, wherein the dot pattern is a random distributed dot array
29. The watermark of claim 24, wherein the dot pattern is a result of a set of operations on a set of basic and other types of two-dimensional dot arrays.
30. The watermark of claim 23, wherein the latent image objects contain information which is critical to the application.
31. The watermark of claim 30, wherein the information is from the group consisting of: copy, void, a critical name, and a number from the document.
32. The watermark of claim 23, wherein the latent image object is embedded into each watermark layer by modulation.
33. The watermark of claim 24, wherein the modulation is phase modulation.
34. The watermark of claim 33, wherein any abrupt phase changes along the edges of the latent image object are smoothed.
35. The watermark of claim 33, wherein there is included a decoder for each watermark layer which has a decoder structure related to a dot pattern structure of a carrier dot pattern of the relevant watermark layer and in the direction where the latent image object is embedded.
36. The watermark of claim 35, wherein the relationship is selected from the group consisting of: the same, and conjunct.
37. The watermark of claim 35, wherein after modulation the watermark layer and its decoder each carries part of the information of the latent image object which is generated based on the latent image object and a random function.
38. The watermark of claim 23, wherein the watermark layers are different to each other and are of sufficient difference to avoid interference between them as a result of them being superposed.
39. The watermark of claim 35, wherein one of the watermark layers is a counterfeit-proof layer, the decoder for which is a photocopier.
40. The watermark of claim 39, wherein after superposition of the watermark layers with the counterfeit-proof layer dots which are too close to adjacent dots in a non-object area are removed.
41. The watermark of claim 23 included on or in a document for protection and authentication.
42. The watermark of claim 4 1, wherein the watermark is included on or in the document as a device selected from the group consisting of: background, seal, logo, graphic device, trade mark and a word.
43. The watermark of claim 23, wherein the watermark is coloured.
44. The watermark as claimed in claim 43, wherein the watermark layers are in different colour channels in various colour spaces.
45. The watermark as claimed in claim 44, wherein colour spaces CMY/CMYK, HIS, XYZ, Yuv and RGB are used.
US09/810,971 2000-09-15 2001-03-16 Optical watermark Expired - Fee Related US7366301B2 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG2000/000147 WO2002023481A1 (en) 2000-09-15 2000-09-15 Optical watermark

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2000/000147 Continuation-In-Part WO2002023481A1 (en) 2000-09-15 2000-09-15 Optical watermark

Publications (2)

Publication Number Publication Date
US20020054680A1 true US20020054680A1 (en) 2002-05-09
US7366301B2 US7366301B2 (en) 2008-04-29

Family

ID=20428862

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/810,971 Expired - Fee Related US7366301B2 (en) 2000-09-15 2001-03-16 Optical watermark

Country Status (8)

Country Link
US (1) US7366301B2 (en)
EP (1) EP1317734B1 (en)
JP (1) JP4373045B2 (en)
CN (1) CN1170254C (en)
AT (1) ATE289437T1 (en)
AU (1) AU785178B2 (en)
DE (1) DE60018222T2 (en)
WO (1) WO2002023481A1 (en)

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020146123A1 (en) * 2000-11-08 2002-10-10 Jun Tian Content authentication and recovery using digital watermarks
US20030016841A1 (en) * 2001-01-26 2003-01-23 Reed Alastair M. Watermark detection using adaptive color projections
US20030021442A1 (en) * 2001-07-18 2003-01-30 Masahiko Suzaki Watermark Information embedment device and watermark information detection device
US20030059085A1 (en) * 2001-09-26 2003-03-27 Canon Kabushiki Kaisha Image processing apparatus and image processing method
US20030058477A1 (en) * 2001-09-25 2003-03-27 Brunk Hugh L. Embedding digital watermarks in spot colors
US6754377B2 (en) 1995-05-08 2004-06-22 Digimarc Corporation Methods and systems for marking printed documents
US6763122B1 (en) 1999-11-05 2004-07-13 Tony Rodriguez Watermarking an image in color plane separations and detecting such watermarks
US20050021970A1 (en) * 2003-07-21 2005-01-27 Curtis Reese Embedded data layers
US20050018845A1 (en) * 2003-07-01 2005-01-27 Oki Electric Industry Co., Ltd. Electronic watermark embedding device, electronic watermark detection device, electronic watermark embedding method, and electronic watermark detection method
US20050030588A1 (en) * 2003-08-06 2005-02-10 Curtis Reese Methods and apparatus utilizing embedded data layers
US20050053234A1 (en) * 2003-09-05 2005-03-10 Alasia Alfred V. System and method for authenticating an article
US20050177726A1 (en) * 2003-12-22 2005-08-11 Alasia Alfred V. Method and system for controlling encoded image production using image signatures
US20050237577A1 (en) * 2004-04-26 2005-10-27 Alasia Alfred V System and method for decoding digital encoded images
US20060029278A1 (en) * 2004-04-26 2006-02-09 Alasia Alfred V Systems and methods for authenticating objects using multiple-level image encoding and decoding
US20060054043A1 (en) * 2004-09-09 2006-03-16 Markus Luthi Item with forgery-proof printing
US20060155658A1 (en) * 2004-08-19 2006-07-13 United States Postal Service Printed postage container having integrated security features
US20060165257A1 (en) * 2005-01-24 2006-07-27 Kabushiki Kaisha Toshiba Image processing apparatus, image processing method, and print product
US20070008560A1 (en) * 2005-07-08 2007-01-11 Xerox Corporation Method for prepress-time color match verification and correction
US20070057061A1 (en) * 2005-09-09 2007-03-15 Alasia Alfred V Reflective decoders for use in decoding optically encoded images
US20070079124A1 (en) * 2003-11-11 2007-04-05 Kurato Maeno Stowable mezzanine bed
WO2007062554A1 (en) 2005-12-01 2007-06-07 Peking University Founder Group Co. Ltd A method and device for embedding digital watermark into a text document and detecting it
US20070165903A1 (en) * 2006-01-05 2007-07-19 Munro Calum H Bragg diffracting security markers
US20070254138A1 (en) * 2004-06-11 2007-11-01 Jens Remmer Layered Security Material and Method of Manufacturing Such
US20080226125A1 (en) * 2005-10-26 2008-09-18 Koninklijke Philips Electronics, N.V. Method of Embedding Data in an Information Signal
US20080276324A1 (en) * 2005-04-13 2008-11-06 Koninklijke Philips Electronics, N.V. Encoding With Watermarking Prior to Phase Modulation
US20090004231A1 (en) * 2007-06-30 2009-01-01 Popp Shane M Pharmaceutical dosage forms fabricated with nanomaterials for quality monitoring
US20090220121A1 (en) * 2002-01-18 2009-09-03 John Stach Arrangement of Objects in Images or Graphics to Convey a Machine-Readable Signal
US20100297027A1 (en) * 2004-12-20 2010-11-25 Nanolnk, Inc. Overt authentication features for compositions and objects and methods of fabrication and verification thereof
US7860268B2 (en) 2006-12-13 2010-12-28 Graphic Security Systems Corporation Object authentication using encoded images digitally stored on the object
US20110135888A1 (en) * 2009-12-04 2011-06-09 Ppg Industries Ohio, Inc. Crystalline colloidal array of particles bearing reactive surfactant
CN102122384A (en) * 2011-01-25 2011-07-13 机密科技公司 Method for manufacturing hidden pattern during plate making for presswork
US20110182467A1 (en) * 2010-01-26 2011-07-28 Nanoink, Inc. Moiré pattern generated by angular illumination of surfaces
US8171567B1 (en) * 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
US20120103211A1 (en) * 2010-11-01 2012-05-03 Ppg Industries Ohio, Inc. Method of imaging in crystalline colloidal arrays
US8181884B2 (en) 2003-11-17 2012-05-22 Digimarc Corporation Machine-readable features for objects
US8582194B2 (en) 2010-04-29 2013-11-12 Ppg Industries Ohio, Inc. Thermally responsive crystalline colloidal arrays
CN103448402A (en) * 2012-05-28 2013-12-18 广州市人民印刷厂股份有限公司 Unlocking anti-counterfeiting method
US8641933B2 (en) 2011-09-23 2014-02-04 Ppg Industries Ohio, Inc Composite crystal colloidal array with photochromic member
CN104228380A (en) * 2013-06-21 2014-12-24 广州市人民印刷厂股份有限公司 Invisible unlocking type anti-counterfeiting method
US9022648B2 (en) 2010-11-11 2015-05-05 Prc-Desoto International, Inc. Temperature sensitive composite for photonic crystals
US9275303B2 (en) 2010-10-11 2016-03-01 Graphic Security Systems Corporation Method for constructing a composite image incorporating a hidden authentication image
US9811671B1 (en) 2000-05-24 2017-11-07 Copilot Ventures Fund Iii Llc Authentication method and system
US10826900B1 (en) * 2014-12-31 2020-11-03 Morphotrust Usa, Llc Machine-readable verification of digital identifications
US11046856B2 (en) 2011-09-23 2021-06-29 Ppg Industries Ohio, Inc. Hollow particle crystalline colloidal arrays

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030056103A1 (en) * 2000-12-18 2003-03-20 Levy Kenneth L. Audio/video commerce application architectural framework
US7738673B2 (en) 2000-04-19 2010-06-15 Digimarc Corporation Low visible digital watermarks
US7213757B2 (en) 2001-08-31 2007-05-08 Digimarc Corporation Emerging security features for identification documents
US20040179713A1 (en) * 2003-03-11 2004-09-16 Kenji Tani Image processing method, image processing apparatus, and information processing apparatus
AU2003902810A0 (en) * 2003-06-04 2003-06-26 Commonwealth Scientific And Industrial Research Organisation Method of encoding a latent image
RU2344054C2 (en) 2003-07-07 2009-01-20 Коммонвелс Сайнтифик Энд Индастриал Рисеч Организейшен Method of coding latent image
EP1547805A1 (en) * 2003-12-23 2005-06-29 Elca Informatique S.A. Method for generating and validating tickets printable at home
JP2008502058A (en) * 2004-05-18 2008-01-24 シルバーブルック リサーチ ピーティワイ リミテッド Method and computer system for tracking security documents
US8144558B1 (en) * 2004-09-14 2012-03-27 Doug Carson & Associates, Inc. Hidden patterns on a data storage medium
US7706025B2 (en) * 2005-10-31 2010-04-27 Xerox Corporation Moiré-based auto-stereoscopic watermarks
RU2008125810A (en) 2005-12-05 2010-01-20 Коммонвелс Сайнтифик Энд Индастриал Рисеч Организейшн (Au) METHOD FOR FORMING A HIDDEN IMAGE
JP4719717B2 (en) 2006-06-27 2011-07-06 株式会社リコー Image processing apparatus, image processing method, and image processing program
WO2008091768A2 (en) * 2007-01-22 2008-07-31 Global Crypto Systems Methods and systems for digital authentication using digitally signed images
DE102008012419A1 (en) 2007-10-31 2009-05-07 Bundesdruckerei Gmbh Polymer composite layer for security and/or valuable documents comprises at least two interlocking polymer layers joined together with a surface printed with a printed layer absorbing in the visible region in and/or on the composite
JP5264311B2 (en) * 2008-06-18 2013-08-14 キヤノン株式会社 Image processing apparatus, control method, and program
WO2010032718A1 (en) * 2008-09-16 2010-03-25 独立行政法人 国立印刷局 Forgery preventive printed matter, method for producing same, and recording medium in which dot data creation software is stored
US9117268B2 (en) 2008-12-17 2015-08-25 Digimarc Corporation Out of phase digital watermarking in two chrominance directions
US8199969B2 (en) 2008-12-17 2012-06-12 Digimarc Corporation Out of phase digital watermarking in two chrominance directions
US9092872B2 (en) 2010-10-11 2015-07-28 Graphic Security Systems Corporation System and method for creating an animation from a plurality of latent images encoded into a visible image
US8792674B2 (en) 2010-10-11 2014-07-29 Graphic Security Systems Corporation Method for encoding and simultaneously decoding images having multiple color components
CN103299323A (en) * 2010-10-26 2013-09-11 朴光敦 Random-type multilayer identification, and system using same
WO2012118912A2 (en) * 2011-03-01 2012-09-07 Graphic Security Systems Corporation A method for encoding and simultaneously decoding images having multiple color components
KR102055231B1 (en) 2011-03-17 2019-12-12 뉴욕 유니버시티 Systems, methods and computer-accessible mediums for authentication and verification of physical objects
US9111340B2 (en) 2011-05-27 2015-08-18 Cisco Technology Inc. Frequency-modulated watermarking
WO2013179249A1 (en) * 2012-05-30 2013-12-05 Label Tech International Trims Limited Authentication apparatus and methods
CN103065101A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Anti-counterfeiting method for documents
US9374497B2 (en) 2014-10-20 2016-06-21 Caterpillar Inc. Component and watermark formed by additive manufacturing
US9937656B2 (en) 2016-07-07 2018-04-10 Caterpillar Inc. Method for printing component with anti-counterfeit features
CN109040761A (en) * 2018-09-17 2018-12-18 俞群爱 A kind of monitoring on-wall system with encrypted watermark
EP3686027B1 (en) 2019-01-27 2021-07-14 U-NICA Systems AG Method of printing authentication indicators with an amplitude-modulated half tone
JP2023003627A (en) * 2021-06-24 2023-01-17 シヤチハタ株式会社 Computer device, method, and computer program
CN115330583A (en) * 2022-09-19 2022-11-11 景德镇陶瓷大学 Watermark model training method and device based on CMYK image

Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4838644A (en) * 1987-09-15 1989-06-13 The United States Of America As Represented By The United States Department Of Energy Position, rotation, and intensity invariant recognizing method
US4921278A (en) * 1985-04-01 1990-05-01 Chinese Academy Of Sciences Identification system using computer generated moire
US5396559A (en) * 1990-08-24 1995-03-07 Mcgrew; Stephen P. Anticounterfeiting method and device utilizing holograms and pseudorandom dot patterns
US5659613A (en) * 1994-06-29 1997-08-19 Macrovision Corporation Method and apparatus for copy protection for various recording media using a video finger print
US5708717A (en) * 1995-11-29 1998-01-13 Alasia; Alfred Digital anti-counterfeiting software method and apparatus
US5734752A (en) * 1996-09-24 1998-03-31 Xerox Corporation Digital watermarking using stochastic screen patterns
US5767889A (en) * 1995-08-23 1998-06-16 Intermec Corporation Bar shaving of the resident fonts in an on-demand barcode printer
US5790703A (en) * 1997-01-21 1998-08-04 Xerox Corporation Digital watermarking using conjugate halftone screens
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
US5951055A (en) * 1997-06-11 1999-09-14 The Standard Register Company Security document containing encoded data block
US5995638A (en) * 1995-08-28 1999-11-30 Ecole Polytechnique Federale De Lausanne Methods and apparatus for authentication of documents by using the intensity profile of moire patterns
US6000728A (en) * 1991-07-12 1999-12-14 The Standard Register Company Security document
US6104812A (en) * 1998-01-12 2000-08-15 Juratrade, Limited Anti-counterfeiting method and apparatus using digital screening
US6145081A (en) * 1998-02-02 2000-11-07 Verance Corporation Method and apparatus for preventing removal of embedded information in cover signals
US6252971B1 (en) * 1998-04-29 2001-06-26 Xerox Corporation Digital watermarking using phase-shifted stoclustic screens
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US6438251B1 (en) * 1997-12-03 2002-08-20 Kabushiki Kaisha Toshiba Method of processing image information and method of preventing forgery of certificates or the like
US6456726B1 (en) * 1999-10-26 2002-09-24 Matsushita Electric Industrial Co., Ltd. Methods and apparatus for multi-layer data hiding
US6577746B1 (en) * 1999-12-28 2003-06-10 Digimarc Corporation Watermark-based object linking and embedding
US6636616B1 (en) * 1999-11-30 2003-10-21 Xerox Corporation Method and apparatus for digital watermarking using error diffusion
US6748533B1 (en) * 1998-12-23 2004-06-08 Kent Ridge Digital Labs Method and apparatus for protecting the legitimacy of an article
US6879652B1 (en) * 2000-07-14 2005-04-12 Nielsen Media Research, Inc. Method for encoding an input signal

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4921278A (en) * 1985-04-01 1990-05-01 Chinese Academy Of Sciences Identification system using computer generated moire
US4838644A (en) * 1987-09-15 1989-06-13 The United States Of America As Represented By The United States Department Of Energy Position, rotation, and intensity invariant recognizing method
US5396559A (en) * 1990-08-24 1995-03-07 Mcgrew; Stephen P. Anticounterfeiting method and device utilizing holograms and pseudorandom dot patterns
US6000728A (en) * 1991-07-12 1999-12-14 The Standard Register Company Security document
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US5659613A (en) * 1994-06-29 1997-08-19 Macrovision Corporation Method and apparatus for copy protection for various recording media using a video finger print
US5767889A (en) * 1995-08-23 1998-06-16 Intermec Corporation Bar shaving of the resident fonts in an on-demand barcode printer
US5995638A (en) * 1995-08-28 1999-11-30 Ecole Polytechnique Federale De Lausanne Methods and apparatus for authentication of documents by using the intensity profile of moire patterns
US5708717A (en) * 1995-11-29 1998-01-13 Alasia; Alfred Digital anti-counterfeiting software method and apparatus
US5734752A (en) * 1996-09-24 1998-03-31 Xerox Corporation Digital watermarking using stochastic screen patterns
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
US5790703A (en) * 1997-01-21 1998-08-04 Xerox Corporation Digital watermarking using conjugate halftone screens
US5951055A (en) * 1997-06-11 1999-09-14 The Standard Register Company Security document containing encoded data block
US6438251B1 (en) * 1997-12-03 2002-08-20 Kabushiki Kaisha Toshiba Method of processing image information and method of preventing forgery of certificates or the like
US6104812A (en) * 1998-01-12 2000-08-15 Juratrade, Limited Anti-counterfeiting method and apparatus using digital screening
US6145081A (en) * 1998-02-02 2000-11-07 Verance Corporation Method and apparatus for preventing removal of embedded information in cover signals
US6252971B1 (en) * 1998-04-29 2001-06-26 Xerox Corporation Digital watermarking using phase-shifted stoclustic screens
US6748533B1 (en) * 1998-12-23 2004-06-08 Kent Ridge Digital Labs Method and apparatus for protecting the legitimacy of an article
US6456726B1 (en) * 1999-10-26 2002-09-24 Matsushita Electric Industrial Co., Ltd. Methods and apparatus for multi-layer data hiding
US6636616B1 (en) * 1999-11-30 2003-10-21 Xerox Corporation Method and apparatus for digital watermarking using error diffusion
US6577746B1 (en) * 1999-12-28 2003-06-10 Digimarc Corporation Watermark-based object linking and embedding
US6879652B1 (en) * 2000-07-14 2005-04-12 Nielsen Media Research, Inc. Method for encoding an input signal

Cited By (83)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6754377B2 (en) 1995-05-08 2004-06-22 Digimarc Corporation Methods and systems for marking printed documents
US6763122B1 (en) 1999-11-05 2004-07-13 Tony Rodriguez Watermarking an image in color plane separations and detecting such watermarks
US9811671B1 (en) 2000-05-24 2017-11-07 Copilot Ventures Fund Iii Llc Authentication method and system
US20020146123A1 (en) * 2000-11-08 2002-10-10 Jun Tian Content authentication and recovery using digital watermarks
US8032758B2 (en) 2000-11-08 2011-10-04 Digimarc Corporation Content authentication and recovery using digital watermarks
US20080276089A1 (en) * 2000-11-08 2008-11-06 Jun Tian Content Authentication and Recovery Using Digital Watermarks
US7389420B2 (en) 2000-11-08 2008-06-17 Digimarc Corporation Content authentication and recovery using digital watermarks
US20030016841A1 (en) * 2001-01-26 2003-01-23 Reed Alastair M. Watermark detection using adaptive color projections
US7995790B2 (en) 2001-01-26 2011-08-09 Digimarc Corporation Digital watermark detection using predetermined color projections
US20070147653A1 (en) * 2001-01-26 2007-06-28 Reed Alastair M Digital Watermark Detection Using Predetermined Color Projections
US7072487B2 (en) 2001-01-26 2006-07-04 Digimarc Corporation Watermark detection using adaptive color projections
US7039215B2 (en) * 2001-07-18 2006-05-02 Oki Electric Industry Co., Ltd. Watermark information embedment device and watermark information detection device
US20030021442A1 (en) * 2001-07-18 2003-01-30 Masahiko Suzaki Watermark Information embedment device and watermark information detection device
US6993149B2 (en) 2001-09-25 2006-01-31 Digimarc Corporation Embedding digital watermarks in spot colors
US20030058477A1 (en) * 2001-09-25 2003-03-27 Brunk Hugh L. Embedding digital watermarks in spot colors
US20030059085A1 (en) * 2001-09-26 2003-03-27 Canon Kabushiki Kaisha Image processing apparatus and image processing method
US7171019B2 (en) * 2001-09-26 2007-01-30 Canon Kabushiki Kaisha Image processing apparatus and image processing method
US20090220121A1 (en) * 2002-01-18 2009-09-03 John Stach Arrangement of Objects in Images or Graphics to Convey a Machine-Readable Signal
US7831062B2 (en) * 2002-01-18 2010-11-09 Digimarc Corporation Arrangement of objects in images or graphics to convey a machine-readable signal
US8886946B1 (en) * 2002-09-04 2014-11-11 Copilot Ventures Fund Iii Llc Authentication method and system
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
US8171567B1 (en) * 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
US7245740B2 (en) * 2003-07-01 2007-07-17 Oki Electric Industry Co., Ltd. Electronic watermark embedding device, electronic watermark detection device, electronic watermark embedding method, and electronic watermark detection method
US20050018845A1 (en) * 2003-07-01 2005-01-27 Oki Electric Industry Co., Ltd. Electronic watermark embedding device, electronic watermark detection device, electronic watermark embedding method, and electronic watermark detection method
US20050021970A1 (en) * 2003-07-21 2005-01-27 Curtis Reese Embedded data layers
US20050030588A1 (en) * 2003-08-06 2005-02-10 Curtis Reese Methods and apparatus utilizing embedded data layers
WO2005027401A1 (en) * 2003-09-05 2005-03-24 Graphic Security Systems Corporation System and method for authenticating an article
US7226087B2 (en) 2003-09-05 2007-06-05 Graphic Security Systems Corporation System and method for authenticating an article
AU2004303346B2 (en) * 2003-09-05 2009-01-08 Graphic Security Systems Corporation System and method for authenticating an article
US6980654B2 (en) * 2003-09-05 2005-12-27 Graphic Security Systems Corporation System and method for authenticating an article
US20050053234A1 (en) * 2003-09-05 2005-03-10 Alasia Alfred V. System and method for authenticating an article
US20050052017A1 (en) * 2003-09-05 2005-03-10 Alasia Alfred V. System and method for authenticating an article
US20070079124A1 (en) * 2003-11-11 2007-04-05 Kurato Maeno Stowable mezzanine bed
US8181884B2 (en) 2003-11-17 2012-05-22 Digimarc Corporation Machine-readable features for objects
US7114074B2 (en) 2003-12-22 2006-09-26 Graphic Security Systems Corporation Method and system for controlling encoded image production using image signatures
US20050177726A1 (en) * 2003-12-22 2005-08-11 Alasia Alfred V. Method and system for controlling encoded image production using image signatures
US7551752B2 (en) 2004-04-26 2009-06-23 Graphic Security Systems Corporation Systems and methods for authenticating objects using multiple-level image encoding and decoding
US20050237577A1 (en) * 2004-04-26 2005-10-27 Alasia Alfred V System and method for decoding digital encoded images
US20080088880A1 (en) * 2004-04-26 2008-04-17 Graphic Security Systems Corporation System and Method for Decoding Digital Encoded Images
US7561308B2 (en) 2004-04-26 2009-07-14 Graphic Security Systems Corporation System and method for decoding digital encoded images
US7512249B2 (en) 2004-04-26 2009-03-31 Graphic Security Systems Corporation System and method for decoding digital encoded images
US20060029278A1 (en) * 2004-04-26 2006-02-09 Alasia Alfred V Systems and methods for authenticating objects using multiple-level image encoding and decoding
US20070254138A1 (en) * 2004-06-11 2007-11-01 Jens Remmer Layered Security Material and Method of Manufacturing Such
US20090269482A1 (en) * 2004-06-11 2009-10-29 Ahlstrom Kauttua Oy Layered security material and method of manufacturing such
US9704301B2 (en) * 2004-08-19 2017-07-11 United States Postal Service Printed postage container having integrated security features
US20060155658A1 (en) * 2004-08-19 2006-07-13 United States Postal Service Printed postage container having integrated security features
US20060054043A1 (en) * 2004-09-09 2006-03-16 Markus Luthi Item with forgery-proof printing
US20100297027A1 (en) * 2004-12-20 2010-11-25 Nanolnk, Inc. Overt authentication features for compositions and objects and methods of fabrication and verification thereof
US7613318B2 (en) * 2005-01-24 2009-11-03 Kabushiki Kaisha Toshiba Image processing apparatus, image processing method, and print product
US20060165257A1 (en) * 2005-01-24 2006-07-27 Kabushiki Kaisha Toshiba Image processing apparatus, image processing method, and print product
US20080276324A1 (en) * 2005-04-13 2008-11-06 Koninklijke Philips Electronics, N.V. Encoding With Watermarking Prior to Phase Modulation
US20070008560A1 (en) * 2005-07-08 2007-01-11 Xerox Corporation Method for prepress-time color match verification and correction
US8243325B2 (en) * 2005-07-08 2012-08-14 Xerox Corporation Method for prepress-time color match verification and correction
US20070057061A1 (en) * 2005-09-09 2007-03-15 Alasia Alfred V Reflective decoders for use in decoding optically encoded images
US20090127340A1 (en) * 2005-09-09 2009-05-21 Graphic Security Systems Corporation Reflective Decoders for Use in Decoding Optically Encoded Images
US7819324B2 (en) * 2005-09-09 2010-10-26 Graphic Security Systems Corporation Reflective decoders for use in decoding optically encoded images
US7487915B2 (en) * 2005-09-09 2009-02-10 Graphic Security Systems Corporation Reflective decoders for use in decoding optically encoded images
USRE45726E1 (en) * 2005-09-09 2015-10-06 Graphic Security Systems Corporation Reflective decoders for use in decoding optically encoded images
US20080226125A1 (en) * 2005-10-26 2008-09-18 Koninklijke Philips Electronics, N.V. Method of Embedding Data in an Information Signal
EP1956823A4 (en) * 2005-12-01 2008-11-12 Beijing Founder Electronics Co A method and device for embedding digital watermark into a text document and detecting it
US8107129B2 (en) 2005-12-01 2012-01-31 Peking University Founder Group Co., Ltd. Methods and apparatus for embedding and detecting digital watermarks in a text document
WO2007062554A1 (en) 2005-12-01 2007-06-07 Peking University Founder Group Co. Ltd A method and device for embedding digital watermark into a text document and detecting it
EP1956823A1 (en) * 2005-12-01 2008-08-13 Beijing Founder Electronics Co., Ltd. A method and device for embedding digital watermark into a text document and detecting it
US20070165903A1 (en) * 2006-01-05 2007-07-19 Munro Calum H Bragg diffracting security markers
US9327538B2 (en) 2006-01-05 2016-05-03 Ppg Industries Ohio, Inc. Bragg diffracting security markers
US7860268B2 (en) 2006-12-13 2010-12-28 Graphic Security Systems Corporation Object authentication using encoded images digitally stored on the object
US20090004231A1 (en) * 2007-06-30 2009-01-01 Popp Shane M Pharmaceutical dosage forms fabricated with nanomaterials for quality monitoring
US10060860B2 (en) 2007-06-30 2018-08-28 Smp Logic Systems Pharmaceutical dosage forms fabricated with nanomaterials
US20110135888A1 (en) * 2009-12-04 2011-06-09 Ppg Industries Ohio, Inc. Crystalline colloidal array of particles bearing reactive surfactant
WO2011094221A2 (en) 2010-01-26 2011-08-04 Nanoink, Inc. Moire patterns generated by angular illumination of surfaces
US20110182467A1 (en) * 2010-01-26 2011-07-28 Nanoink, Inc. Moiré pattern generated by angular illumination of surfaces
US8382002B2 (en) 2010-01-26 2013-02-26 Nanoink, Inc. Moiré pattern generated by angular illumination of surfaces
US8582194B2 (en) 2010-04-29 2013-11-12 Ppg Industries Ohio, Inc. Thermally responsive crystalline colloidal arrays
US9275303B2 (en) 2010-10-11 2016-03-01 Graphic Security Systems Corporation Method for constructing a composite image incorporating a hidden authentication image
US8490546B2 (en) * 2010-11-01 2013-07-23 Ppg Industries Ohio, Inc. Method of imaging in crystalline colloidal arrays
US20120103211A1 (en) * 2010-11-01 2012-05-03 Ppg Industries Ohio, Inc. Method of imaging in crystalline colloidal arrays
US9022648B2 (en) 2010-11-11 2015-05-05 Prc-Desoto International, Inc. Temperature sensitive composite for photonic crystals
CN102122384A (en) * 2011-01-25 2011-07-13 机密科技公司 Method for manufacturing hidden pattern during plate making for presswork
US8641933B2 (en) 2011-09-23 2014-02-04 Ppg Industries Ohio, Inc Composite crystal colloidal array with photochromic member
US11046856B2 (en) 2011-09-23 2021-06-29 Ppg Industries Ohio, Inc. Hollow particle crystalline colloidal arrays
CN103448402A (en) * 2012-05-28 2013-12-18 广州市人民印刷厂股份有限公司 Unlocking anti-counterfeiting method
CN104228380A (en) * 2013-06-21 2014-12-24 广州市人民印刷厂股份有限公司 Invisible unlocking type anti-counterfeiting method
US10826900B1 (en) * 2014-12-31 2020-11-03 Morphotrust Usa, Llc Machine-readable verification of digital identifications

Also Published As

Publication number Publication date
CN1170254C (en) 2004-10-06
JP4373045B2 (en) 2009-11-25
DE60018222T2 (en) 2006-01-12
US7366301B2 (en) 2008-04-29
WO2002023481A1 (en) 2002-03-21
CN1372677A (en) 2002-10-02
EP1317734A1 (en) 2003-06-11
AU7569000A (en) 2002-03-26
DE60018222D1 (en) 2005-03-24
AU785178B2 (en) 2006-10-12
ATE289437T1 (en) 2005-03-15
EP1317734B1 (en) 2005-02-16
JP2003530737A (en) 2003-10-14

Similar Documents

Publication Publication Date Title
US7366301B2 (en) Optical watermark
EP0953939B1 (en) Digital watermarking using phase-shifted stoclustic screens
EP1591953B1 (en) System and method for decoding digital encoded images
EP1229725B1 (en) System and method for generating color digital watermarks using conjugate halftone screens
US5790703A (en) Digital watermarking using conjugate halftone screens
EP1173001A2 (en) Authenticatable image with an embedded image having a discernible physical characteristic
Celik et al. Hierarchical watermarking for secure image authentication with localization
EP1554700B1 (en) Authentication of documents and articles by moire patterns
US5734752A (en) Digital watermarking using stochastic screen patterns
Huang et al. Optical watermarking for printed document authentication
EP1286531B1 (en) Authenticatable image with an embedded image having a discernible physical characteristic with improved security feature
US20040091050A1 (en) Digital image watermarking apparatus and method
US20080048433A1 (en) Single-color screen patterns for copy protection
Sun et al. An optical watermarking solution for authenticating printed documents
KR20030005347A (en) Optical Watermark
Khan et al. Increased PSNR with improved DWT digital watermarking technique
Busch et al. Evolution of music score watermarking algorithm
BRPI0906398A2 (en) improvement in steganography and the means for its generation and automated reading
Mahmoud Low Resolution Watermarking for Print Security

Legal Events

Date Code Title Description
AS Assignment

Owner name: TRUSTCOPY PTE LTD., SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHENG, HUANG;KANG, WU JIAN;REEL/FRAME:011629/0670

Effective date: 20010305

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20200429